/system/vold/ |
H A D | Utils.cpp | 64 status_t res = 0; local 78 res = -errno; 87 return res; 109 int res = fs_prepare_dir(cpath, mode, uid, gid); local 116 if (res == 0) { 206 status_t res = ForkExecvp(cmd, output, untrusted ? sBlkidUntrustedContext : sBlkidContext); local 207 if (res != OK) { 209 return res; 265 status_t res = android_fork_execvp(argc, argv, NULL, false, true); local 272 return res; 379 status_t res = ReadRandomBytes(16, out); local 526 uint64_t res = calculate_dir_size(dirfd); local 542 status_t res = -1; local [all...] |
H A D | BenchmarkGen.h | 4058 status_t res = 0; local 4059 res |= CreateFile("stub", 0); 4061 res |= CreateFile("file115", 0); 4062 res |= CreateFile("file125", 0); 4063 res |= CreateFile("file43", 49152); 4064 res |= CreateFile("file2", 57016320); 4065 res |= CreateFile("file17", 176128); 4066 res |= CreateFile("file126", 0); 4067 res |= CreateFile("file4", 0); 4068 res | 4246 status_t res = 0; local [all...] |
/system/bt/btif/src/ |
H A D | btif_hf.cc | 1233 tBTA_AG_RES res = 0xff; local 1305 res = BTA_AG_MULTI_CALL_RES; 1307 res = BTA_AG_OUT_CALL_CONN_RES; 1308 BTA_AgResult(BTA_AG_HANDLE_ALL, res, &ag_res); 1324 res = BTA_AG_IN_CALL_CONN_RES; 1327 res = BTA_AG_IN_CALL_HELD_RES; 1329 res = BTA_AG_CALL_CANCEL_RES; 1335 res = BTA_AG_OUT_CALL_CONN_RES; 1337 res = BTA_AG_CALL_CANCEL_RES; 1349 res [all...] |
/system/bt/stack/btm/ |
H A D | btm_acl.cc | 1320 uint8_t res = btm_cb.acl_disc_reason; local 1322 return (res);
|
H A D | btm_ble.cc | 339 * res - result of the operation BTM_SUCCESS if success. 346 void BTM_SecurityGrant(const RawAddress& bd_addr, uint8_t res) { argument 348 (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_REPEATED_ATTEMPTS; 362 * res - result of the operation BTM_SUCCESS if success 369 void BTM_BlePasskeyReply(const RawAddress& bd_addr, uint8_t res, argument 373 (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_PASSKEY_ENTRY_FAIL; 394 * res - comparison result BTM_SUCCESS if success 397 void BTM_BleConfirmReply(const RawAddress& bd_addr, uint8_t res) { argument 400 (res == BTM_SUCCESS) ? SMP_SUCCESS : SMP_PASSKEY_ENTRY_FAIL; 420 * res 427 BTM_BleOobDataReply(const RawAddress& bd_addr, uint8_t res, uint8_t len, uint8_t* p_data) argument 2018 uint8_t res = 0; local [all...] |
H A D | btm_sec.cc | 811 * res - result of the operation BTM_SUCCESS 819 void BTM_PINCodeReply(const RawAddress& bd_addr, uint8_t res, uint8_t pin_len, argument 827 res); 848 res = BTM_ILLEGAL_VALUE; 850 if (res != BTM_SUCCESS) { 1452 * Parameters: res - result of the operation BTM_SUCCESS if 1457 void BTM_ConfirmReqReply(tBTM_STATUS res, const RawAddress& bd_addr) { argument 1461 btm_pair_state_descr(btm_cb.pairing_state), res); 1470 if ((res == BTM_SUCCESS) || (res 1505 BTM_PasskeyReqReply(tBTM_STATUS res, const RawAddress& bd_addr, uint32_t passkey) argument 1632 BTM_RemoteOobDataReply(tBTM_STATUS res, const RawAddress& bd_addr, BT_OCTET16 c, BT_OCTET16 r) argument 4253 uint8_t res; local 5704 btm_sec_dev_rec_cback_event(tBTM_SEC_DEV_REC* p_dev_rec, uint8_t res, bool is_le_transport) argument 5939 res); local [all...] |
/system/core/init/ |
H A D | service.cpp | 370 int res = LookupCap(arg); local 371 if (res < 0) { 375 unsigned int cap = static_cast<unsigned int>(res); // |res| is >= 0.
|
/system/core/libusbhost/ |
H A D | usbhost.c | 674 int res; local 685 res = ioctl(req->dev->fd, USBDEVFS_SUBMITURB, urb); 686 } while((res < 0) && (errno == EINTR)); 688 return res; 697 int res = poll(&p, 1, timeoutMillis); local 699 if (res != 1 || p.revents != POLLOUT) { 708 int res = TEMP_FAILURE_RETRY(ioctl(dev->fd, timeoutMillis == -1 ? USBDEVFS_REAPURB : local 710 D("%s returned %d\n", timeoutMillis == -1 ? "USBDEVFS_REAPURB" : "USBDEVFS_REAPURBNDELAY", res); 712 if (res < 0) {
|
/system/core/sdcard/ |
H A D | fuse.cpp | 913 int res; local 926 res = -ENOENT; 930 res = -EACCES; 934 res = -EACCES; 940 res = -ENOENT; 954 res = -ENOENT; 959 res = rename(old_child_path, new_child_path); 960 if (res == -1) { 961 res = -errno; 966 res 1040 int res; local 1066 int res; local 1092 int res; local 1146 int res = is_data_sync ? fdatasync(fd) : fsync(fd); local 1464 int res = handle_fuse_request(fuse, handler, hdr, data, data_len); local [all...] |
/system/core/toolbox/ |
H A D | newfs_msdos.c | 114 u_int8_t res[2]; /* reserved sectors */ member in struct:bsbpb 158 u_int res; /* reserved sectors */ member in struct:bpb 474 bpb.res = opt_r; 513 if (bpb.bsec < (bpb.res ? bpb.res : bss) + 523 (bpb.res ? bpb.res : bss) + 552 set_res = !bpb.res; 567 bpb.res = (fat == 32 ? MAX(x, MAX(16384 / bpb.bps, 4)) : x) + extra_res; 568 else if (bpb.res < [all...] |
/system/extras/simpleperf/ |
H A D | record.h | 90 uint32_t cpu, res; member in struct:PerfSampleCpuType
|
/system/libhwbinder/ |
H A D | IPCThreadState.cpp | 162 const int32_t res = *cmd++; local 163 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)"); 221 const int32_t res = *cmd++; local 222 out << ": " << res << (res ? " (SUCCESS)" : " (FAILURE)");
|
/system/media/camera/src/ |
H A D | camera_metadata.c | 628 int res; local 634 res = append_camera_metadata(clone, src); 635 if (res != OK) {
|
/system/netd/server/ |
H A D | BandwidthController.cpp | 306 int res = 0; local 340 res |= iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr); 341 if (res) { 351 res |= updateQuota(cost, maxBytes); 352 if (res) { 395 int res = 0; local 400 res = removeSharedAlert(); 401 if (res == 0) { 407 return res; 485 ALOGV("Read quota res 511 const int res = iptablesRestoreFunction(V4V6, Join(cmds, "\\n"), nullptr); local 567 int res = 0; local 588 int res = 0; local 610 int res = 0; local 625 int res = 0; local 702 int res = 0; local 793 int res; local 907 int res = 0; local [all...] |
/system/tools/hidl/test/ |
H A D | hidl_test_client.cpp | 2082 int res; local 2083 while ((res = getopt_long(argc, argv, "hbpd", longopts, NULL)) >= 0) { 2084 switch (res) {
|
/system/bt/bta/hf_client/ |
H A D | bta_hf_client_at.cc | 826 int res; local 829 res = sscanf(buffer, "%u%n", &value, &offset); 830 if (res < 1) { 857 int res; local 859 while ((res = sscanf(buffer, "%u%n", &value, &offset)) > 0) { 874 if (res > 0) { 888 int res; local 890 while ((res = sscanf(buffer, "(\"%128[^\"]\",(%u%*[-,]%u))%n", name, &min, 908 if (res > 2) { 982 int res; local 1074 int res; local 1106 int res; local 1137 int res; local 1175 int res; local 1214 int res; local 1287 int res; local 1346 int res; local [all...] |
/system/nfc/halimpl/bcm2079x/adaptation/ |
H A D | userial_linux.c | 1391 uint8_t res[10]; local 1411 USERIAL_Read(port, res, sizeof(res));
|
/system/update_engine/ |
H A D | omaha_request_action.cc | 1062 XML_Status res = XML_Parse( local 1069 if (res != XML_STATUS_OK || parser_data.failed) {
|
/system/bt/bta/dm/ |
H A D | bta_dm_act.cc | 1050 tBTM_STATUS res = BTM_NOT_AUTHORIZED; local 1052 if (p_data->confirm.accept == true) res = BTM_SUCCESS; 1053 BTM_ConfirmReqReply(res, p_data->confirm.bd_addr); 1095 tBTM_STATUS res = BTM_NOT_AUTHORIZED; local 1097 if (p_data->ci_rmt_oob.accept == true) res = BTM_SUCCESS; 1098 BTM_RemoteOobDataReply(res, p_data->ci_rmt_oob.bd_addr, p_data->ci_rmt_oob.c, 4237 BTM_SecurityGrant(p_data->ble_sec_grant.bd_addr, p_data->ble_sec_grant.res);
|
H A D | bta_dm_int.h | 351 tBTA_DM_BLE_SEC_GRANT res; member in struct:__anon101
|